ITIES - ERCIM - ERCIM News

Page created by Debra Tran
 
CONTINUE READING
ITIES - ERCIM - ERCIM News
ercim-news.ercim.eu                                   Number 127   October 2021

ERCIM                                        NEWS
Special theme:

                           I R
                          C CU
                      D
                                                 L AR CIT
   A R T A N

                      IES M
                         S
Also in this issue
Digital Inclusion:
Using Localisation Technologies and Haptic Feedback
for a More Inclusive Society
ITIES - ERCIM - ERCIM News
JointCONTENTS

    Editorial Information                                                               SPECIAL THEME

    ERCIM News is the magazine of ERCIM. Published quarterly, it reports             The special theme “Smart and Circular Cities” has been
    on joint actions of the ERCIM partners, and aims to reflect the contribu-        coordinated by the guest editors Erwin Schoitsch (AIT)
    tion made by ERCIM to the European Community in Information                      and Georgios Mylonas (ISI, Athena Research and
    Technology and Applied Mathematics. Through short articles and news              Innovation Center)
    items, it provides a forum for the exchange of information between the
    institutes and also with the wider scientific community. This issue has a        Introduction to the Special Theme
    circulation of about 6,000 printed copies and is also available online ,at
                                                                                     4 Smart and Circular Cities
                                                                                         by Erwin Schoitsch (AIT) and Georgios Mylonas (ISI,
    https://ercim-news@ercim.eu.
                                                                                         Athena Research and Innovation Center)
    ERCIM News is published by ERCIM EEIG
                                                                                     6 Smart Governance for Cybersecurity
    BP 93, F-06902 Sophia Antipolis Cedex, France
                                                                                       by Michael Kreutzer and Kirstin Scheel (Fraunhofer
    +33 4 9238 5010, contact@ercim.eu
                                                                                       SIT)
    Director: Philipp Hoschka, ISSN 0926-4981
                                                                                     7 Policies and Recommendations for IT Security in
    Contributions                                                                      Urban Environments from the Morgenstadt Urban
    Contributions should be submitted to the local editor of your country              Data Partnership Project
                                                                                       by Philipp Lämmel, Michell Boerger, Nikolay
    Copyrightnotice                                                                   Tcholtchev (Fraunhofer FOKUS) and Eva Ottendörfer
    All authors, as identified in each article, retain copyright of their work.        (Fraunhofer IAO)
    ERCIM News is licensed under a Creative Commons Attribution 4.0
    International License (CC-BY).                                                   9 Data Privacy in Smart Cities – Federated Learning
                                                                                       to the Rescue?
    Advertising                                                                        by Anastasia Pustozerova and Rudolf Mayer (SBA
    For current advertising rates and conditions, see                                  Research)
    https://ercim-news.ercim.eu/ or contact peter.kunz@ercim.eu
                                                                                     10 Considering Cybersecurity with Trustworthy IoT in
    ERCIMNewsonlineedition:ercim-news.ercim.eu/
                                                                                        Smart Cities
                                                                                        by Christoph Klikovits (Forschung Burgenland),
                                                                                        Clemens Gnauer (Forschung Burgenland), Patrik
    Nextissue:
                                                                                        Abraham (Fachhochschule Burgenland)
    January 2022: Quantum Computing

                                                                                     12 Digital Twins for Cyber-Physical Threat Detection
    Subscription
                                                                                        and Response
    Subscribe to ERCIM News by sending an email to
                                                                                        by Matthias Eckhart, Andreas Ekelhart (SBA Research
    en-subscriptions@ercim.eu                                                           and University of Vienna), and Roland Eisl (ENRAG)

    EditorialBoard:                                                                 13 Circularity and Sustainability in Modern Smart
    Central editor:                                                                     Grids Through Innovative Energy Market
    Peter Kunz, ERCIM office (peter.kunz@ercim.eu)                                      Architectures
                                                                                        by Nikolaos Efthymiopoulos, Prodromos Makris,
    Local Editors:                                                                      Emmanouel Varvarigos (National Technical University
    • Christine Azevedo Coste, Inria, France (christine.azevedo@inria.fr)               of Athens)
    • Andras Benczur, SZTAKI, Hungary (benczur@info.ilab.sztaki.hu)
    • José Borbinha, Univ. of Technology Lisboa, Portugal (jlb@ist.utl.pt)           15 Enabling Smart Control and Fair Sharing of
    • Are Magnus Bruaset, SIMULA, Norway (arem@simula.no)                               Renewable Resources in Energy Communities
    • Monica Divitini, NTNU, Norway (divitini@ntnu.no)                                  by Sonam Norbu, Benoit Couraud, Merlinda Andoni,
    • Marie-Claire Forgue, ERCIM/W3C (mcf@w3.org)                                       David Flynn (Heriot-Watt University, Edinburgh) and
    • Lida Harami, FORTH-ICT , Greece (lida@ics.forth.gr)                               Valentin Robu (CWI and TU Delft)
    • Athanasios Kalogeras, ISI, Greece (kalogeras@isi.gr)
                                                                                     17 Green Energy Planning of IoT Rule Automation
    • Georgia Kapitsaki, Univ. of Cyprus, Cyprus (gkapi@cs.ucy.ac.cy)
                                                                                        Workflows in Smart Environments
    • Annette Kik, CWI, The Netherlands (Annette.Kik@cwi.nl)
                                                                                        by Soteris Constantinou (University of Cyprus),
    • Hung Son Nguyen, Unviv. of Warsaw, Poland (son@mimuw.edu.pl)
                                                                                        Andreas Konstantinidis (Frederick University) and
    • Alexander Nouak, Fraunhofer-Gesellschaft, Germany
                                                                                        Demetrios Zeinalipour-Yazti (University of Cyprus)
      (alexander.nouak@iuk.fraunhofer.de)
    • Maria Rudenschöld, RISE, Sweden (maria.rudenschold@ri.se)                      18 Using Telematics to Gather User Behaviour Data
    • Harry Rudin, Switzerland (hrudin@smile.ch)                                        from a Fleet of Electric Bicycles
    • Erwin Schoitsch, AIT, Austria (erwin.schoitsch@ait.ac.at)                         by Sam Gunner, Eddie Wilson and Theo Tryfonas
    • Thomas Tamisier,LIST, Luxembourg (thomas.tamisier@list.lu)                        (University of Bristol)
    • Maurice ter Beek, ISTI-CNR, Italy (maurice.terbeek@isti.cnr.it)
2                                                                                                                       ERCIM NEWS 127 October 2021
ITIES - ERCIM - ERCIM News
20 Tethys: An Edge Computing–Ready Water Metering             REEARCH AND INNOVATION
   System for Smart Cities
   by Dimitrios Amaxilatis (SparkWorks Ltd.), Ioannis      Digital Inclusion
   Chatzigiannakis (Sapienza University of Rome) and       36 Using Localisation Technologies and Haptic
   Simos Papadogeorgos (Power Made SA)                        Feedback for a More Inclusive Society
                                                              by Barbara Leporini (ISTI-CNR) and Maria Teresa
22 Circular Intelligence: Using a Smart Digital               Paratore (ISTI-CNR)
   Platform to Encourage the Collection of Used
   Cooking Oil from Households                             Privacy-Preserving Computation
   by Thanasis Gentimis, Theodore Chatzidimitriou and      38 Supporting Privacy Preservation by Distributed and
   Antonis Kokossis (SymbioLabs)                              Federated Learning on the Edge
                                                              by Davide Bacciu (UNIPI), Patrizio Dazzi (CNR-ISTI)
23 Seamless Distributed Traffic Monitoring for Smart          and Alberto Gotta (CNR-ISTI)
   Cities Using Fibre Optic Acoustic Sensing
   by Martin Litzenberger, Carmina Coronel and Christoph   39 CT Scans Reveal a Double Panel in an Oil Sketch
   Wiesmeyr (AIT Austrian Institute of Technology             after Rubens
   GmbH)                                                      by Marta Domínguez-Delmás (UvA), Francien Bossema
                                                              (CWI), Erma Hermens (Rijksmuseum, UvA)
25 Forging the Future of Responsive Cities Through
   Local Digital Twins
   by Susie Ruston McAleer, Mark McAleer and Pavel
   Kogut (21c Consultancy Ltd)                                ANNOUNCEMENTS

26 Recovering Non-Conventional Water Sources in the        40 26th Conference on Formal Methods for Industrial
   Mediterranean: The HYDROUSA Project                        Critical Systems
   Experience                                                 by Maurice ter Beek (ISTI-CNR)
   by Simos Malamis, Stavroula Kappa, Eleni Nyktari and
   Constantinos Noutsopoulos (National Technical           41 PerAwareCity & WSCC 2022 - Call for Papers
   University of Athens)
                                                           42 W3C/SMPTE Joint Workshop on Professional
28 Vigilantes del Aire – Measuring Air Quality in Spain       Media Production on the Web
   by Daniel Bruno, Miguel Sevilla-Callejo, Enrique
   Navarro (Pyrenean Institute of Ecology) and Francisco   42 ERCIM “Alain Bensoussan” Fellowship Programme
   Sanz (Ibercivis Foundation)
                                                           43 Dagstuhl Seminars and Perspectives Workshops
30 A Holistic and Scalable Solution for Research,
   Innovation and Education During the Energy
   Transition
   by Helen C. Leligou (University of West Attica)            IN bRIEF

31 How Small Initiatives Create Smart City Dynamics:       43 Marta Kwiatkowska and Susan Murphy win CWI’s
   The ICC Experience of Patras                               Van Wijngaarden Awards 2021
   by Petros Ganos, Athanasios Kalogeras, Tanya Politi
   and Lena Tsipouri

33 Digital Cities, Digital Tourism, Digital Arts – A
   Research Agenda
   by Christian Thomay and Markus Tauber (Research
   Studios Austria FG), Christoph Schmittner (Austrian
   Institute of Technology GmbH) and Beatriz Tadeo Fuica
   (IRCAV, Sorbonne-Nouvelle University)

34 Circularity in Small Island Cities
   by Sobah Abbas Petersen (SINTEF Digital) and Hanne
   Cecilie Geirbo (Oslo Metropolitan University)

ERCIM NEWS 127 October 2021                                                                                         3
ITIES - ERCIM - ERCIM News
Special Theme

    Introduction to the Special Theme

    Smart and Circular Cities
    by Erwin Schoitsch (AIT) and Georgios Mylonas (ISI, Athena Research and Innovation Center)

    Smart city technologies have been pro-         section and a multidisciplinary             communities, e.g., in rural areas. They
    liferating at a rapid pace for some years      approach. The fact that the implementa-     discuss five preventive measures that
    now, and at the same time, the divide          tion and deployment of such systems         might help to mitigate cyber incidents
    between the natural and digital worlds         involves the participation of a large       towards smartification. When it comes
    has lessened considerably. Multiple            number of citizens has also opened a        to IT security in urban environments,
    sensing endpoints located in our envi-         window for opportunities in fields such     Lämmel et al. (page 7) discuss policies
    ronment, offices, homes, devices, and          as citizen science and co-creation.         and recommendations towards the
    even our body, produce continuous                                                          secure implementation and operation of
    streams of sensor data. At the same time,      This special theme of ERCIM News            urban infrastructure. In this context, the
    the concept of the circular economy has        reports on academic and industry            Urban Data Partnership (UDP) aims to
    entered the mainstream, and we are now         research that addresses technology, sys-    accelerate the digital transformation of
    seeing many communities and busi-              tems, applications, and services in the     cities and communities, while consid-
    nesses adopt novel approaches based on         Smart and Circular Cities domain. This      ering data security. Moreover,
    circularity (e.g., in the European Green       section includes articles targeting         Pustozerova and Mayer (page 9) discuss
    Cities Network). European policy               important elements such as security and     aspects of using Federated Learning, an
    (“Green Deal”) has reacted to the chal-        privacy, as well as the integration of      ML approach that is quickly gathering
    lenges of climate change and environ-          technologies like Digital Twins and the     traction, for data security and privacy
    mental footprint reduction, particularly       Smart Grid, which are still evolving at a   purposes in smart cities. They argue that
    in the context of large urban agglomera-       rapid pace. Experiences from deploy-        although its adoption is growing, there
    tion. Smartness (intelligence) must            ments that use more conventional            are still challenges to overcome, and
    address not only the immediate goals of        approaches from a technological stand-      further investigation of defense mecha-
    human wellbeing, assisted living and           point offer us glimpses of the near         nisms is needed. Furthermore, Klikovits
                                                                                               et al. (page 10) present an approach to
                                                                                               integrating the plethora of constantly
                                                                                               changing IoT devices and services
                                                                                               within a smart city setting, based on the
                                                                                               combination of an ID provider and the
                                                                                               Arrowhead framework.

                                                                                               Resilient Cities: Digital Twin and
                                                                                               Smart Grid
                                                                                               Moving on to novel technologies that
                                                                                               are quickly becoming part of the smart
                                                                                               city landscape, the Digital Twin is one
                                                                                               such technology. Digital Twins are cur-
                                                                                               rently being introduced to help us on
                                                                                               multiple fronts, including data security
                                                                                               and privacy. The SecurityTwin project,
    Figure1:The17UNSustainableDevelopmentGoals(SDGs).Source:un.org.                  presented in this issue by Eckhart et al.
                                                                                               (page 12), aims to develop the funda-
                                                                                               mental methods for employing the dig-
    comfort but, perhaps even more impor-          future, while reports from smart city       ital-twin concept to enhance the secu-
    tantly, long-term sustainability, as           projects using novel methodologies and      rity of Cyber-Physical systems and pro-
    defined by the 17 UN Sustainable               technologies give us a better sense of      vide the basis for implementing intru-
    Development Goals (Figure 1).                  how smart city research will evolve to      sion detection and response methods.
                                                   encompass new communities and tools.        Meanwhile, the Smart Grid is another
    In this environment, Smart Cities, AI                                                      field that has become a part of the
    and the IoT, together with sustainability      Security and Privacy Issues                 research landscape, with its importance
    and circular economy, form a significant       Kreutzer et al. (page 6) discuss a frame-   accentuated by the need to accelerate
    part of the current research landscape.        work for facilitating the transition from   towards more sustainable cities.
    Several challenges have surfaced when          existing smart city services to smart       Efthymiopoulos et al. (page 13) present
    designing and applying these systems in        governance, arguing that thus far           the FLEXGRID project, which investi-
    fields like energy, sustainability, smart      research has focused more on technical      gates the constraints of current smart
    transportation and digital twinning,           aspects, leaving out of the equation        grid architectures preventing integra-
    especially when discussing their cross-        more common ones, or even whole             tion of large-scale distributed energy

4                                                                                                                ERCIM NEWS 127 October 2021
ITIES - ERCIM - ERCIM News
resources into distribution networks and    anomalies. Such data can lead to indi-        Sustainability projects in specific
aiming to mitigate circularity and sus-     rect observations, e.g., indoor activity      contexts
tainability in modern smart grids. The      levels during the COVID-19 pandemic.          Finally, there is the issue of focusing on
project is currently developing a digital   Moreover, the circular economy is             specific communities and co-creation to
platform to offer digital energy services   entering our daily lives. Gentimis et al.     deliver for smart and circular cities.
helping energy sector stakeholders to       (page 22) present a digital platform that     Ruston McAleer et al. (page 25) present
automate and optimise the planning,         aims to encourage citizens to recycle         the COMPAIR project, scheduled to
operation and management of systems         used cooking oil in West Macedonia,           begin in November 2021, which brings
and assets.                                 Greece. The goal is for the platform to       social and emotional intelligence into
                                            be adopted by 10,000 households across        the decision-making process within
At the same time, energy communities        13 municipalities in this area.               cities. H. Lelligou (page 30) presents
have been forming throughout Europe                                                       the ASSET project, which focused on
to facilitate sustainable energy produc-    Novel technologies and methods                the educational community, an impor-
tion in a decentralised manner. Norbu et    Going back to major issues at the heart       tant community for the transition to
al. (page 15) discuss the Responsive        of smart and circular cities, traffic mon-    smart and circular cities. The project
Flexibility (ReFLEX) project, currently     itoring, air quality and pollution moni-      produced more than 25 training pro-
the UK’s largest smart energy demon-        toring, as well as sustainable water          grammes on energy transition, evalu-
strator, focusing on an energy commu-       resource management immediately               ated through pilot studies. Ganos et al.
nity at the Orkney Islands in Scotland      spring to mind. Over recent years, the        (page 31) present their experiences
comprising 200 households. They             research community has attempted to           from several smart city initiatives in the
developed algorithms for the smart con-     tackle them using rather conventional         city of Patras, Greece, and argue that
trol of energy assets and redistribution    approaches. However, we are beginning         even small communities with limited
mechanisms, achieving a fairer redistri-    to see more innovative approaches             resources can make a difference and
bution in the process. At a more            adopted, utilising novel methodologies.       facilitate change. Thomay et al. (page
localised scale, within home environ-       In the context of real-time traffic moni-     33) tackle the issue of sustainable
ments, Constantinou et al. (page 17)        toring, Litzenberger et al. (page 23) use     tourism in smart cities, and how digital
propose the IMCF+ framework to facil-       fiber optic acoustic sensing and the          tourism can provide new ways to share
itate the smart consumption of energy at    existing telecom fiber cable infrastruc-      cities’ cultural heritage. Furthermore,
the time it is produced by e.g., photo-     ture in a prototype study in Graz,            Abbas Petersen and Geirbo (page 34)
voltaics on the roof of a building. Their   Austria. Initial results suggest that it is   discuss the Learning Flexibility project,
strategy relies on an AI-inspired algo-     feasible to derive real-time traffic esti-    focusing on waste management and cir-
rithm to schedule energy consumption        mation using this approach. Ruston            cularity in regions such as small islands.
of various devices, using a variety of      McAleer et al. (page 25) discuss the          The project takes a bottom-up
strategies while at the same time           emerging concept of city-scale Digital        approach, in contrast to the more con-
meeting indoor comfort level require-       Twins and present the DUET project.           ventional top-bottom approach adopted
ments.                                      The pilots developed in the project           by many related projects, aiming to
                                            across three cities are expected to go        identify innovative and sustainable
Optimising the use of established           live in autumn 2021, tackling mobility        solutions.
methods and tools                           and air quality, city planning and public
Several projects utilise more estab-        decision-making. Bruno et al. (page 28)       Overall, research on smart and circular
lished tools and technologies in the cir-   discuss the use of plants, specifically       cities in Europe appears to be moving
cular and smart city domain – for           strawberries, as biosensors to monitor        towards using innovative technologies
example, electric bikes and cars are rap-   air quality. They report on a large-scale     and approaches, reaching to novel
idly becoming part of the urban trans-      deployment across Spain in the                application domains, as well as encom-
port landscape. Gunner et al. (page 18)     “Vigilantes del Aire” project, utilising      passing communities in a more active
discuss results obtained by fitting moni-   samples from 205 municipalities and 26        and engaging manner.
toring equipment to a fleet of electric     Spanish provinces. Malamis et al. (page
bikes that were deployed as part of the     26) address sustainable water resource        Please contact:
H2020 Lighthouse Project REPLI-             management as investigated by the             Erwin Schoitsch
CATE in Bristol, UK. This has pro-          HYDROUSA project, which uses inno-            Austrian Institute of Technology,
duced a dataset that could help us better   vative nature-based solutions (NBS) to        Austria
understand aspects such as route selec-     manage a variety of water streams. The        erwin.schoitsch@ait.ac.at
tion by e-bike users or identify city       project promotes decentralised on-site
areas where cycling infrastructure          water, materials and energy conserva-         Georgios Mylonas
would be most beneficial. Smart water       tion, treatment and reuse. It has estab-      ISI, Athena Research and Innovation
metering is another quickly evolving        lished large-scale demonstrators in           Center, Greece
domain, following electric power            three Greek islands, while its solutions      mylonasg@athenarc.gr
metering. Amaxilatis et al. (page 20)       are being evaluated in 25 early-adopter
describe Tethys, a large-scale water        cases in other Mediterranean coastal
metering deployment in Thessaloniki,        areas.
Greece, using water consumption data
to identify patterns, behaviours and

ERCIM NEWS 127 October 2021                                                                                                            5
ITIES - ERCIM - ERCIM News
Special Theme

    Smart Governance for Cybersecurity
    by Michael Kreutzer and Kirstin Scheel (Fraunhofer SIT)

    The topic of smartification has become ubiquitous; urban planners and public organisations are
    investing heavily in digitalisation projects. At the same time, cybersecurity often seems to still be a
    sideshow. Is there a way to get from smart cities to smart governance?

    The Fraunhofer Institute for Secure            mendations of this governance frame-           be aware of the necessity of security as
    Information Technology SIT is one of           work are transferable and help                 a cornerstone of digitalisation and smar-
    the world’s leading research institutes        strengthen the cybersecurity of all smart      tification projects. If you want your
    for cybersecurity and privacy protection.      community projects.                            projects in this area to be sustainable,
    It is part of the National Research Center                                                    forward-thinking, and accepted by citi-
    for Applied Cybersecurity ATHENE and           We have identified five preventive             zens and public employees alike, cyber-
    as such is an essential part of the cyber-     measures that might help to mitigate           security needs to be embedded in the
    security strategy of the Federal               cyber incidents in the process of smarti-      organisational culture.
    Government and the State of Hesse.             fication. We intend these principles to
                                                   be applicable as a governance frame-           Clear responsibilities need to be
    As part of a project for the Hessian           work on all areas of smart communities.        assigned. This is particularly true in
    Ministry of the Interior and Sports on         The framework, represented in Figure           hierarchically structured organisations.
    cybersecurity processes within and             1, is based on the principles of:              Lack of responsibility or diffusion
    across Hessian municipalities, our             (i) anchoring,                                 thereof can counteract preventive meas-
    research has led us to realise that existing   (ii) responsibilities,                         ures. In addition, appropriate resources
    work on smart city developments has            (iii) unification,                             to act on said responsibilities are
    tended to focus on technical challenges        (iv) co-operation, and                         required. For example, reporting chan-
    and/or theoretical attack scenarios. It        (v) improvement.                               nels and response times need to be
    emphasises specific aspects of different                                                      defined. It does not end there, though –
    types on attack vectors, privacy impacts       One thing to consider is that these are        they also need to be continually prac-
    and also considerations for transforma-        not meant to be building on each other –       ticed and lived in everyday life.
    tive frameworks to developing smart            each principle is equally important and        Convenience, unsafe habits and
    cities or protecting them from specific        all need to be in effect to bring about the    “workarounds” are the bane of not just
    attacks. In addition, many papers still        intended outcome. Considering that the         cybersecurity. So, from an organisa-
    only talk about smart cities when in fact      most ingenious smart development is            tional psychological perspective,
    rural communities also benefit from digi-      likely happening as part of an existing        raising awareness and strengthening a
    talisation – hence our preference for the      legacy system, it becomes clear that the       culture of responsibility is important.
    term “smart communities”.                      governance needs to be embedded to
                                                   bring about a cohesive cybersecurity           Another central idea is the unification
    However, what seems to be missing in           framework.                                     across organisational units. In the field
    the race to “smartification” is a frame-                                                      of IT this can mean a competently set up
    work that helps formulate an encom-            Cybersecurity needs to be anchored at          infrastructure to prevent failures. Many
    passing governance perspective for all         the top level. Top management needs to         cases of malware infestation can spread
    projects, which ensures that cybersecu-
    rity underpins all digital developments.
    Our goal is an integrated multidiscipli-
    nary security framework.

    We started our project with a broad liter-
    ature review, with a specific focus on
    publications from/on Germany’s federal
    structures [1], as the original research
    ordinance is focused on the state of
    Hesse [2]. In addition, we launched a
    preliminary and continuing review of
    publicly available sources on real cyber-
    attacks on public infrastructures. We
    supplemented this with structured inter-
    views with public sector officials in the
    field of cybersecurity. The observations
    we are presenting here are a preliminary
    culmination deduced from these and
    need to be tested in practice.
    Nonetheless, we believe that the recom-                            Figure1:Proposedstepstowardssmartgovernance.

6                                                                                                                    ERCIM NEWS 127 October 2021
ITIES - ERCIM - ERCIM News
through systems that are not properly         Dynamically changing environments             References
segmented. IT experts are needed – and        require continuous improvement.               [1] G. R. Wollinger and A. Schulze
they need to continually update their         Learning from internal and external mis-          Eds.: “Handbuch Cybersecurity für
skills.                                       takes is essential to keep up with these          die öffentliche Verwaltung,
                                              developments. Innovations as well as              Wiesbaden: Kommunal- und
Operational co-operation and cross-           paradigm shifts are the norm, especially          Schul-Verlag, 2020”, [online]
divisional collaboration are also             in the digital world. It is necessary to          available: https://kwz.me/h8a
important. Especially in the public           make learning an integral part of the         [2] J. Remy and R. Stettner:
sector, resources need to be used effi-       organisational culture. In the field of IT        “Cybersicherheit als Aufgabe der
ciently and effectively. With regard to       this is nothing new and is usually referred       Länder,” Datenschutz Datensich,
cybersecurity, this can help achieve a        to in the form of maturity models.                vol. 45, no. 4, pp. 254–258, 2021,
higher level of protection overall. For       However, we believe that this needs to be         doi: 10.1007/s11623-021-1429-y.
complex IT systems, such as those in          rooted at the heart of the entire organisa-
smart communities, to work securely           tion and smart community.                     Please contact:
together, the different units need to be                                                    Kirstin Scheel
connected. Information needs to flow –        We will continue our research in this         Fraunhofer Institute for Secure
and to actually be used as well as            field in the coming months as part of the     Information Technology SIT, Germany
processed. Vertical and horizontal net-       current project and hope to expand on it      kirstin.scheel@sit.fraunhofer.de
working is needed.                            in the future.                                +49 6151 869 268

Policies and Recommendations for IT Security
in Urban Environments from the Morgenstadt
Urban Data Partnership Project
by Philipp Lämmel, Michell Boerger, Nikolay Tcholtchev (Fraunhofer FOKUS) and Eva Ottendörfer
(Fraunhofer IAO)

Urban ICT infrastructure is playing an increasingly decisive role as the technical backbone of smart
cities. To guarantee the protection of the public sector and citizens in this context, the security of this
infrastructure is of utmost importance and should be continuously monitored and improved. This article
presents measures and recommendations towards ensuring the security of urban ICT infrastructures.

The smart cities domain is becoming           One aim of this initiative is to stimulate    urban use cases. Therefore, all stake-
ever more relevant for our society. The       the transfer of knowledge between             holders, including the city government,
accelerating digitalisation of processes      cities/communities by creating common         should be encouraged from the begin-
in urban settings is expected to lead to      knowledge as well as sharing experi-          ning to create a culture of cybersecurity
long-term improvements, enhancing the         ence and strategies regarding the effi-       throughout all the involved public enti-
quality of life of inhabitants and creating   cient and secure management of urban          ties.
more liveable, sustainable, and inclusive     data. In the long term, the UDP aims to
cities. Information and communications        accelerate the digital transformation of      Apply security frameworks and
technology (ICT) plays an essential role      cities and communities, while consid-         standards
as the backbone of digital transforma-        ering (data) security in an urban envi-       To secure a smart city/community, the
tion. New optimisation opportunities are      ronment. Based on knowledge gleaned           security of the ICT infrastructure must
arising due to the ICT-enabled emerging       from the UDP, this article presents           be addressed as early as the conception
capabilities for combining and evalu-         measures and recommendations to               phase. Security is important at every
ating new services and data sources. In       ensure the security of urban ICT serv-        step of the development lifecycle and
addition, digitalisation and the accompa-     ices and systems in smart urban envi-         vulnerabilities should be avoided at
nying transformation of the economy           ronments. The fundamental policies and        every level. To this end, the National
and our everyday lives offer the poten-       recommendations are discussed below           Institute of Standards and Technology
tial to optimise fundamental urban            and summarised in Figure 1.                   (NIST) has published a cybersecurity
processes, e.g. in the domains of                                                           framework [1] covering many topics.
mobility, transportation and energy.          Stakeholder engagement and                    This framework is a must-read for
                                              governance                                    anyone involved or interested in
To ensure that cities and communities do      An open ecosystem of diverse stake-           improving security in their city, com-
not have to face these diverse challenges     holders who are aware of the impor-           munity or organisation.
on their own, the Urban Data                  tance of cybersecurity in a smart city is
Partnership (UDP) was founded by the          a fundamental driver for the sustainable      In addition, in 2002, the OECD pub-
Fraunhofer Morgenstadt network [L1].          and secure implementation of smart            lished revised guidelines for informa-

ERCIM NEWS 127 October 2021                                                                                                             7
ITIES - ERCIM - ERCIM News
Special Theme

    tion systems and network security,
    underpinned by nine principles [2]: (1)
    awareness, (2) responsibility, (3)                                             Stakeholder Engagement &
    response, (4) ethics, (5) democracy, (6)                                             Gover nance
                                                                                         Governance
    risk assessment, (7) security design and
    implementation, (8) security manage-
    ment, and (9) reassessment. NIST
    expanded upon these principles in their                                                                                 Apply Security
    document        Systems        Security       v
                                                 Avoid
                                                 Avoid kn
                                                       known Security
                                                                                                                            Frameworks &
                                                    Vulnerabilities
                                                    Vulnerabilities
    Engineering: Considerations for a                                                                                         Standards
                                                                                                                              Standar
    Multidisciplinary Approach in the
    Engineering of Trustworthy Secure                                                     URBAN
    Systems [3]. This document provides a                                                   ICT
                                                                                         SECURITY
    taxonomy of security design principles
    to be used as a basis for engineering
    trustworthy, reliable, and secure sys-
    tems.
                                                        Cover                                                                   Train
                                                                                                                                Train
    Avoid known security vulnerabilities           Security Basics                                                       Security Personnel
    and threats
    Since software is becoming increas-
    ingly complex and interconnected, the       Figure1:Overviewofidentifiedmeasuresandrecommendationswhicharecrucialforensuring
    difficulty of achieving application secu-   thesecurityofurbanICTservicesandsystems.
    rity is also increasing exponentially.
    Therefore, the Open Web Application
    Security Project (OWASP) published          • Strong access controls: All systems            Links:
    the ten most critical security risks for      that are not currently in use should be        [L1] https://kwz.me/h79
    web applications [L2]. These have             disabled. Unused remote manage-                [L2] https://kwz.me/h7f
    become the de facto standard for appli-       ment functions and ports should also
    cation security. We recommend that all        be disabled to prevent attackers from          References:
    actors involved in developing an urban        accessing them. Furthermore, net-              [1] NIST, “Framework for Improving
    ICT infrastructure study the risks and        work activities should be scanned                  Critical Infrastructure
    resulting measures identified by the          regularly, and suspicious internet                 Cybersecurity, Version 1.1,”
    OWASP.                                        traffic should be monitored with the               National Institute of Standards and
                                                  help of security incident and event                Technology, Gaithersburg, MD,
    Cover security basics                         management tools to detect attacks at              NIST CSWP 04162018, Apr. 2018.
    The following security basics should be       an early stage.                                    DOI:
    followed:                                                                                        10.6028/NIST.CSWP.04162018.
    • On-time software updates: All soft-       Train security personnel                         [2] OECD Guidelines for the Security
      ware used in an urban ICT environ-        A further security-related challenge is              of Information Systems and
      ment should be kept up to date, so        the training of staff to secure an urban             Networks. OECD Publishing,
      that no known security vulnerabilities    infrastructure. Due to the rapid growth              2002. doi:
      can be exploited. All firewalls and       and expansion of smart cities, there is              10.1787/9789264059177-en-fr.
      antivirus programs should be updated      currently a shortage of security experts         [3] R. Ross et al., “Systems Security
      regularly.                                in the urban context. Therefore, the                 Engineering: Considerations for a
    • Enforce secure passwords and poli-        training and certification of profes-                Multidisciplinary Approach in the
      cies: Users should regularly update       sionals for the development, construc-               Engineering of Trustworthy Secure
      their passwords to ensure that they       tion, operation, and maintenance of                  Systems,” National Institute of
      are unique and complex. Strict poli-      urban ICT infrastructures should be                  Standards and Technology, NIST
      cies should be enforced to ensure that    urgently promoted.                                   SP 800-160, Nov. 2016. DOI:
      passwords are secure. Furthermore,                                                             10.6028/NIST.SP.800-160.
      establishing security operation cen-      Summary
      tres could be helpful to monitor secu-    In summary, particular policies and rec-         Please contact:
      rity, mitigate vulnerabilities, and       ommendations should be followed for              Philipp Lämmel
      respond to attacks.                       the secure implementation and opera-             Fraunhofer Institute for Open
    • Correct     operating     procedures:     tion of urban ICT infrastructures,               Communication Systems FOKUS,
      Deploying firewalls is an important       namely: stakeholder engagement and               Germany
      step in protecting a smart city/com-      governance; application of security              philipp.laemmel@fokus.fraunhofer.de
      munity. Determining the type of traf-     frameworks and standards; avoidance
      fic allowed to pass through the fire-     of known security vulnerabilities;
      wall is one of the most central ways      training of personnel; coverage of secu-
      to protect a network from potential       rity basics; and the establishment of
      attacks.                                  adequate security processes.

8                                                                                                                  ERCIM NEWS 127 October 2021
ITIES - ERCIM - ERCIM News
Data Privacy in Smart Cities
– Federated Learning to the Rescue?
by Anastasia Pustozerova and Rudolf Mayer (SBA Research)

Within any smart system, data is vital for making the management of resources and assets more
efficient. At the same time, data is a potential vulnerability to data owners, and it could become a
threat in the hands of an adversary. Data security and privacy are therefore critical for building
sustainable smart systems like smart cities. In such systems, where data collection is distributed,
federated learning seems like a prime candidate to address the issue of data privacy. However, there
are still concerns that need to be addressed regarding privacy and security in federated learning.

Machine learning demands large                and new attack vectors open up simply            models on poisoned data or directly
amounts of data to build effective            due to the distributed nature of feder-          manipulate model updates [3]. An adver-
models that can help to improve serv-         ated learning (see Figure 1).                    sary who is able to compromise the
ices. In many real-world scenarios, data                                                       aggregator can perform attacks on the
originates at the edge, e.g., smart meters    Security risks (integrity and availability).     global model. Another threat comes from
and sensors in smart power grids. In tra-     Malicious participants of federated              non-secure communication channels
ditional machine learning workflows,          learning or adversaries leveraging trans-        when an adversary is able to steal or mali-
data must be centralised from different       ferred information can corrupt the               ciously modify shared model updates.
sources before performing the model           learning process to degrade the global
training. Concentrating all data in one       model quality or to make it perform target       Privacy risks (confidentiality). Model
place creates a single point of failure –     misclassification. In smart cities, success-     parameters exchanged during federated
an adversary that can potentially gain        fully executed attacks can result in adver-      learning represent an abstraction of the
access to this centralised data is a threat   saries manipulating situations to favour         training data. Adversaries might infer
to multiple entities.                         them – for example, by manipulating              information about training data having
                                              demand-driven pricing – or can even              access to the model. In smart cities, data
Federated learning enhances data pri-         result in the failure of critical services and   generated by sensors and IoT devices
vacy in machine learning by suggesting        infrastructure, and thus lead to major           often involves personal privacy, and
a new perspective on applying machine         safety issues. Security risks in federated       this is thus a great concern. It is thus
learning for the analysis of distributed      learning can originate through data or           important to mitigate potential leaks of
data. The main idea is to train machine       model poisoning (backdoor attacks), or           this data through the machine learning
learning models closer to the place           when an adversary alters the data at infer-      process. Federated learning with the
where data originates – and just aggre-       ence time (evasion attack). Backdoor             increased exchange of models might,
gate these trained models instead of the      attacks pose one of the biggest challenges       however, increase the attack surface.
(sensitive or private) data. Federated        in federated learning as they are espe-          Adversaries can perform different
learning, therefore, eliminates the need      cially hard to detect. The challenge is          attacks on shared models in federated
to share and centralise sensitive data,       increased by the secret nature of local          learning, e.g., model inversion, trying to
allowing data owners to keep it private       training data, which makes it hard to            recreate the original samples from the
while at the same time offering compa-        analyse the correctness of the contribu-         model, or membership inference,
rable effectiveness of models.                tion of clients. Malicious clients can train     aiming to infer the membership of some

Federated learning architectures often
consist of data owners (clients), which
perform local training of the models on
their own data, and a central aggregator,
which collects the models from the
clients and averages them, producing a
global model. The global model can be
sent back to the clients for the next cycle
of training to improve its effectiveness,
and later utilised for predictions. Some
of the main challenges of federated
learning include communication costs,
data and systems heterogeneity. Many
works propose different optimisation
algorithms to tackle these issues, e.g.,
via client sampling or model and gra-
dient compression [1]. However, com-          Figure1:Federatedlearningarchitectureandattackvectors.Anadversarywhoisableto
paratively little attention has been put on   compromiseclients,aserverorcommunicationchannelscanthreatenthesecurityandprivacy
remaining privacy and security risks,         ofthesystem.

ERCIM NEWS 127 October 2021                                                                                                                  9
ITIES - ERCIM - ERCIM News
Special Theme

     particular instance in the training set of   Homomorphic Encryption (HE) allows           in the technology. Further investigation
     a target model [2]. Adversaries can be       mathematical operations to be per-           of defence mechanisms is therefore crit-
     e.g., a compromised or malicious aggre-      formed on encrypted data. Clients can        ical for the successful application of
     gator, or someone stealing models            encrypt their model parameters, and the      federated learning.
     during client-server communication.          coordinator could aggregate them but
                                                  not understand them. Like SMPC, HE           This work has received funding from
     Approaches for mitigating security and       greatly increases computational costs.       the European Union’s Horizon 2020
     privacy risks in federated learning often                                                 research and innovation programme
     still lag behind attacks, but are increas-   Detecting attacks on the integrity and       under grant agreement No 826078.
     ingly in the focus of research activities.   availability of the machine learning
                                                  process is even more difficult. Defences     References:
     Regarding privacy risks, several             like anomaly detection and robust            [1] P. Kairouz, H. Brendan McMahan,
     approaches can be employed.                  aggregation aim to discover potentially          et al.: “Advances and Open
     Differential privacy (DP) aims to bring      harmful models and eliminate their               Problems in Federated Learning”,
     uncertainty into the model outputs to        malicious influence on the global                Foundations and Trends in
     hide personal contributions to the           model. Yet they fail to detect targeted          Machine Learning: Vol. 14: No.
     model; clients can add noise to shared       backdoor attacks, as poisoned models             1–2, pp 1-210, 2021.
     model parameters or train a differen-        look and behave similarly to models          [2] A. Pustozerova and R. Mayer:
     tially private machine learning algo-        that were trained without backdoor [3].          “Information leaks in federated
     rithm. The main downside of this                                                              learning”, in proc. of the Workshop
     approach remains that noise degrades         There has been a dramatic increase in            on Decentralized IoT Systems and
     models performance, thus there is a          interest in federated learning in recent         Security (DISS), 2020.
     trade-off between privacy and utility.       years. Many companies, including             [3] N. Bouacida and P. Mohapatra:
                                                  Apple and Google, are already using              “Vulnerabilities in Federated
     Secure Multi-Party Computation               federated learning for their services.           Learning”, in IEEE Access, vol. 9,
     (SMPC) provides a cryptographic pro-         Interest in this technology is especially        pp. 63229-63249, 2021.
     tocol that allows joint computation of a     high in medical applications and smart
     function while keeping its inputs pri-       cities, where personal data is processed,    Please contact:
     vate. In federated learning, this can        and data privacy is a major concern.         Anastasia Pustozerova
     replace a central aggregator. However,       However, there are still challenges to       SBA Research, Austria
     SMPC poses high computational costs,         address in federated learning.               apustozerova@sba-research.org
     therefore limiting the scalability of fed-   Mitigation of security and privacy risk
     erated learning.                             is especially important for building trust

     Considering Cybersecurity with Trustworthy IoT
     in Smart Cities
     by Christoph Klikovits (Forschung Burgenland), Clemens Gnauer (Forschung Burgenland), Patrik Abraham
     (Fachhochschule Burgenland)

     In today’s smart cities, the question remains how to securely integrate a multitude of different and
     constantly changing Internet of Things (IoT) devices and services. This is where we propose the
     combination of an identity provider (e.g.: ID-Austria [L3]) and the Arrowhead framework [L2] to verify
     sensors by matching them with a known legal identity. By providing an application that assures a
     secure authentication and trustworthy communication for people, sensors, and services in a smart city.

     A variety of technological innovations       this topic and researches an approach to     cities can rely on secure and trustworthy
     have changed the characters of cities in     increase the trustworthiness and secu-       IoT data. Furthermore, the Arrowhead
     recent years. There are millions of          rity of IoT devices. The aim of this         project is implementing more and more
     devices with sensors and actuators dis-      approach is to link existing IoT devices     support services like the on-boarding
     patched with an upward trend in cities       or services with a known legal identity.     procedure [2] which is used for the
     (weather, water and gas metering, traffic    An identity provider (ID-Austria) and        autonomous integration of devices into
     lights and controls, waste management,       an additional support service of the         the service-oriented arrowhead
     etc.). Applying and using evermore of        Arrowhead framework are combined             ecosystem. This procedure strengthens
     these in the context of interconnected       through an integrated approach.              the secure and trustworthy integration
     IoT systems raises the challenge of pro-     Arrowhead was created for the orches-        of devices or services. A proof of con-
     viding trust and security in this context.   tration of large scale IoT data. It offers   cept could be developed in the EFRE
     The Center for Cyber Security of             strong security mechanisms and in com-       project (FE07) “Civis 4.0 Patria” and
     Forschung Burgenland [L1] deals with         bination with the admission ticket,          presented in the FIP / IEEE

10                                                                                                              ERCIM NEWS 127 October 2021
Figure1:Architectureoftrustworthy
                                                                                                  IoTinsmartcities.

International Symposium on Integrated        person or organization is verified and        sion ticket, the backend is informed by
Network Management (IM) workshop             clearly identified. The identified person     the ATP and allowed to publish the pay-
[1].                                         or organization can use their identifica-     load into the frontend. If an admission
                                             tion (bPK) to register various devices or     ticket is invalid or does not exist, the
As shown in Figure 1, various tech-          services in the backend layer. When           frontend release of the payload is not
niques and tools are used to create a dig-   registering, various additional parame-       permitted and is discarded. As applied
ital admission ticket, which is created      ters (IP-Address, Mac-Address, device         in a proof of concept, it shows trust-
based on several parameters (IP, MAC         ID, etc.), related to the device or service   worthy and secure communication in
address, etc.). In addition to the parame-   can be specified. These parameters,           smart cities, where smart devices or
ters listed, the electronic proof of iden-   including a legal identity (bPK), are for-    services are increasingly used.
tity from an identity provider is inte-      warded to the Arrowhead framework.            Matching a unique personal identifier
grated into the creation of the digital      Additionally, to the core services of the     with devices or services enables to link
admission tickets. Three instances and       Arrowhead framework, a further                a person responsible with e.g., IoT sen-
steps linked in an integrated approach       service called the Admission Ticket           sors, whereby trustworthiness, accept-
are required for the creation of an          Provider (ATP) was developed. The             ance and security of devices and serv-
admission ticket. Step 1: Firstly, a         ATP is responsible for generating a hash      ices in a smart city can be strengthened.
person or organization is involved in the    (admission ticket) by combining the
proposed proof of concept shown in           received device or service parameters         Links:
Figure 1. This natural person or corpo-      (e.g., IP address or Mac-address), the        [L1] https://www.forschung-
rate body requires an electronic proof of    unique personal identifier (bPK) and          burgenland.at/cybershysecurity/
identification from an identification        using the SHA-256 function. This              [L2] https://www.arrowhead.eu
provider (e.g., ID-Austria [L3]). While      delivers a string with 64 characters          [L3] https://kwz.me/h7J
logging into a backend layer (e.g., Civis    which will be stored in the ATP-data-         [L4] https://kwz.me/h7M
4.0 Patria backend), the login data is       base and transmitted to the backend for
verified by the identification provider      further use. Afterwards, the person or        References:
using an interface. By using the inter-      organization who registered the device        [1] C. Klikovits, P. Abraham and R.
face to the identification provider, the     or service will receive the admission             Rambacher: “A Framework to
person or organisation does not need         ticket and must store it on the device            identify People, Devices and
any additional login data for the            (e.g., sensor, Raspberry Pi or smart-             Services in Cyber-physical system
backend layer. Step 2: In the verifica-      phone) or service-platform.                       of systems,” 2021 IFIP/IEEE
tion process the identification provider                                                       International Symposium on
determines an unique personal identi-        The certified hash (admission ticket)             Integrated Network Management
fier, called bPK [L4], in two steps:         created by the ATP is stored on both the          (IM), 2021, pp. 914-919.
Firstly, a character string is formed from   respective device or service and in the       [2] A. Bicaku, et al.: “Interacting with
a master number (central register or         ATP database. An implemented                      the arrowhead local cloud: On-
association register, commercial reg-        backend process automatically for-                boarding procedure”, 743-748.
ister entry) and the procedural area.        wards the respective payload including            10.1109/ICPHYS.2018.8390800,
Secondly, a specific hash algorithm cal-     the supplied admission ticket to the ATP          2018.
culates a secure one-way cryptographic       in the Arrowhead framework every time
derivation from this character string and    a device or service transmits data.           Please contact:
encodes the bPK with the Base64 stan-        Furthermore, the admission ticket of the      Christoph Klikovits
dard. Step 3: After the bPK has been         device or service is compared with the        Forschung Burgenland, Austria
transmitted from the identification          stored admission ticket in the ATP. After     christoph.klikovits@forschung-
provider to the backend layer, the           a successful verification of the admis-       burgenland

ERCIM NEWS 127 October 2021                                                                                                               11
Special Theme

     Digital Twins for Cyber-Physical Threat Detection
     and Response
     by Matthias Eckhart, Andreas Ekelhart (SBA Research and University of Vienna), and Roland Eisl (ENRAG)

     Since cyber-physical systems are the backbone of smart cities and innovative industrial applications,
     their safe and secure operation is paramount. However, due to the steadily increasing aggressiveness,
     sophistication, and stealth of cyberattacks, new methods for threat detection and response are needed.
     The concept of digital twins opens up new avenues of research to address these gaps.

     Recent security incidents involving                                                            phases of its lifecycle, consumes real-                                           parallel to their physical counterparts,
     cyber-physical systems (CPSs), such as                                                         time and historical data if required, and                                         closely following their states, provide
     the 2021 Colonial Pipeline cyberattack,                                                        has sufficient fidelity to allow the                                              the means to inspect the behaviour of
     have again demonstrated the vulnera-                                                           implementation of the desired security                                            the CPS without the risk of interference.
     bility of critical infrastructure. While                                                       measure.” [3] Since digital twins are not                                         This unique feature allows rigorous
     the current state of CPS security is                                                           used for redundancy purposes when                                                 monitoring of multiple CPS layers (e.g.,
     already strained, smart technology                                                             applied within the context of security,                                           physics, network, logic) and can be
     trends proceed to evolve, pushing tradi-                                                       the CPS is virtually replicated by means                                          exploited for detecting intrusions.
     tional protection mechanisms to their                                                          of emulation, simulation, and modelling                                           However, such a security-focused use
     limits. As a result, new methods to sup-                                                       techniques to an extent that enables the                                          case necessitates a state replication
     port the implementation of a holistic                                                          implementation of security-enhancing                                              mechanism to keep the digital twins in
     security approach are needed.                                                                  features and activities. For example,                                             sync with their physical counterparts,
     Considering the interdependency of the                                                         digital twins that possess a sufficient                                           and further assumes that the virtual
     cyber and physical domains in which                                                            degree of fidelity allow thorough secu-                                           replicas exhibit benign behaviour [2]. If
     these systems function, adequately pro-                                                        rity testing during both the engineering                                          an alarm is raised, the digital twins can
     tecting CPSs represents a pressing chal-                                                       and the operation phase [1]. This use                                             then be used to identify possible coun-
     lenge. A few years ago, researchers                                                            case of the digital-twin concept spares                                           termeasures and to assess their effec-
     started to explore how the concept of                                                          systems integrators and operators of                                              tiveness as well as their effects on the
     digital twins can be utilised to tackle                                                        CPSs the need to build custom testbeds                                            physical process from a simulation
     this challenge [3].                                                                            or conduct security tests with the real                                           point of view. As initial efforts were
                                                                                                    infrastructure, thereby providing cost                                            directed toward developing the basic
     Within the context of security, the term                                                       savings and preventing uncontrolled                                               principles of this concept [3], more
     “digital twin” can be defined as “... a vir-                                                   interactions with live systems that may                                           research is required to efficiently create,
     tual replica of a system that accompa-                                                         lead to extensive (physical) damages.                                             operate, and maintain these security-
     nies its physical counterpart during                                                           Furthermore, digital twins that run in                                            focused digital twins.
        Lifecycle

                                                                  Engineering                                                                                                   Operation
        Physical Environment

                               Basic & Detaile d Engineering                                                            On-Site Eng.                       Cyber-Physical Sys tem                              R obot 1
                                                                   MC AD
                                          Pr oduct                         E CAD                                                                                                     S witch 1
                                                                                                                                                               HM I 1
                                                                                                              Virtual

                                                                                                                                                                                                      S en so r 1
                                  Pr oce ss          Re sour ce
                                                                                   CSE ng.                               Commiss ioning
                                                                                             .. .                                                                            PLC 1                                  Mo tor 1         Co nvey or B elt 1
                                                                                                                                                                                                                                                                                                  Backp ro pagatio n & Feed back

                                                                                                                                                                                                        Passive Dat a Collectio n
                               Engine ering                                                                                                                 Data Sources
                er

                                                                        Sim ulation &
                                                                                                                                             Ingest io n
        Data Laye

                                  Data                     ͙
                                                           ...           Emulation                  ͙
                                                                                                    ...
                                                                         Knowledge                                                                                           S ystem Log s       Netwo rk                     S en so r
                                                                                                                                                                    LOG
                                                                                                                 Knowledge Base                                                                   Traffic                  Measurem ents

                                                                  Parsin g & Semant ic Lifting

                                                                                                           Framework            Sp ec.
                                                                                                                                                                                                                                           Intrusion Dete ction Me thods

                                                                                                                                                           Digital Twins
        Virtual Environment

                                                                                                                                                                                                    Ph ysical Pro cess
                                                                                                                                                                                                                                                                           Respons e Mechanisms

                                                                                                                             Generation                        HM I 1
                                                                                                                                                                                     S witch 1

                                                     Securityy Tes ting
                                                                                                                                                                                                  Co nvey or B elt 1, S en so r 1,
                                                                                                                  e s in g

                                                                                                                                                                             PLC 1
                                                                                                                                           St imu li
                                                                                                              St imu li

                                                                                                                                                                                                       Mo tor 1, R obot 1
                                                                                                                               State
                                                                                                            Proces

                                                                                                                             Replication                                Ph ysical Pro
                                                                                                                                                                                    o cess & I/O S imulation
                                                                                                                                                                         Sy stem Emu lation & Simulation
                                                                                                                                                                             Net wo rk St ack Emulat io n

                                                                                    Figure1:High-levelarchitectureofthedigital-twinframework.

12                                                                                                                                                                                                                        ERCIM NEWS 127 October 2021
The SecurityTwin project [L1] aims to         manner but also of recovering the dig-         References:
develop the fundamental methods for           ital twins from state mismatches.              [1] M. Eckhart, A. Ekelhart: “Towards
employing the digital-twin concept to                                                            Security-Aware Virtual
enhance the security of CPSs. As part of      Using the architecture we described,               Environments for Digital Twins”,
this project, researchers at SBA              our framework will provide the basis               Proc. of the 4th ACM Workshop on
Research and the University of Vienna,        for implementing intrusion detection               Cyber-Physical System Security.
together with industry professionals at       and response methods. Owing to the                 ACM, 2018.
ENRAG and condignum, will create a            physical models and simulations inte-          [2] M. Eckhart, A. Ekelhart: “A
framework to efficiently build digital        grated into the digital twins, the                 Specification-based State
replicas of CPSs based on engineering         designed intrusion detection system                Replication Approach for Digital
data, emulating components as well as         incorporates knowledge about the phys-             Twins”, Proc. of the 2018
networks, and simulating physical             ical process under control and thereby             Workshop on Cyber-Physical
processes. Figure 1 illustrates the archi-    will yield alerts if the process is steering       Systems Security and Privacy.
tecture of the digital-twin framework on      toward an unintended state. Upon                   ACM, 2018.
a high level. We aim to develop a             detection of adverse events, response          [3] M. Eckhart, A. Ekelhart: “Digital
knowledge base that incorporates              measures can be identified and their               Twins for Cyber-Physical Systems
know-how from numerous heteroge-              applicability, as well as consequences,            Security: State of the Art and
neous data sources (e.g., engineering         assessed by observing the behaviour of             Outlook”, Security and Quality in
data repositories, domain knowledge)          the virtual replicas.                              Cyber-Physical Systems
and provides the semantic foundation                                                             Engineering. Springer, 2019.
for generating the digital twins. This        Building upon our earlier work [1, 2, 3],
knowledge base comprises: (i) informa-        we are currently in the process of devel-      Please contact:
tion about the CPS itself (sourced from       oping the framework as described               Matthias Eckhart, Andreas Ekelhart
engineering artifacts); (ii) information      above. In addition to our contribution as      SBA Research and University of
concerning the simulation and emula-          part of the SecurityTwin project [L1],         Vienna, Austria
tion used as part of the digital twins; and   we want to actively stimulate scientific       meckhart@sba-research.org,
(iii) operational data from the real CPS      exchange in this emerging research             aekelhart@sba-research.org
for state replication and intrusion detec-    area. We are therefore organising the          https://www.sba-research.org/
tion. The digital twins can then be auto-     Dagstuhl seminar 22171 [L2], which is          https://www.sqi.at/
matically generated by instructing the        dedicated to this topic and are encour-
integrated emulation solutions (e.g.,         aging other researchers to share their         Roland Eisl
QEMU) and initialising the embedded           perspectives.                                  ENRAG, Austria
simulation models. Moreover, a syn-                                                          roland.eisl@enrag.at
chronisation mechanism will be devel-         Links:                                         https://www.enrag.at/
oped, which is not only capable of auto-      [L1] https://kwz.me/h7j
matically replicating states in a timely      [L2] https://kwz.me/h7q

Circularity and Sustainability in Modern Smart Grids
Through Innovative Energy Market Architectures
by Nikolaos Efthymiopoulos, Prodromos Makris, Emmanouel Varvarigos (National Technical University of
Athens)

Circularity and sustainability in modern smart grids require open data models that can support dynamic and
efficient distribution-network-aware energy management. In this context, the FLEXGRID [L1] project is
developing a digital platform that will offer digital energy services (DESs) that help energy sector stakeholders
(i.e., Distribution System Operators (DSOs), Transmission System Operators (TSOs), market operators,
Renewable Energy Sources (RES) producers, retailers, flexibility aggregators) to: (i) automate and optimise the
planning, operation and management of their systems and assets, and (ii) interact in a dynamic and efficient
way with the electricity system and other stakeholders.

The large-scale integration of                stated in the EU Clean Energy Package          The first reason is that DSOs use con-
Distributed Energy Resources (DERs),          [1]. In this context, the FLEXGRID             servative constraints in distributed DER
such as PV/wind generation (RES),             project is investigating the constraints       installation to ensure reliable and secure
electric vehicles (EVs), energy storage       of the current smart grid architecture         operation of their network. The root
systems (ESS) and demand side man-            that prevent large scale DER integration       cause of this conservatism is the
agement (DSM) equipment in distribu-          in distribution networks and conse-            inability of DSOs to dynamically and
tion networks poses new challenges and        quently mitigates circularity and sus-         accurately monitor and manage their
opportunities for the power sector, as        tainability in modern smart grids.             networks. The development of a

ERCIM NEWS 127 October 2021                                                                                                               13
You can also read